Memory system and computer system
a computer system and memory technology, applied in the field of logical physical conversion processing, can solve the problems of unintentional rewriting of programs, unintentional rewriting of binary data that the unselected cell stores, and shifting the threshold voltage of an unselected cell from 1 to 0
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
first embodiment
[0132]In the present embodiment, a description is given of logical-physical conversion processing when after the above-described situation where no late defective block has occurred yet, a plurality of access requests to the memory 4 (e.g., reading requests) cause a tentative late defective block due to the read disturb phenomenon.
[0133]FIG. 9 is a diagram showing a configuration of the memory 4 according to the present embodiment.
[0134]As shown in FIG. 9, the reserve storage area 41 in the memory 4 has two management areas 41A, 41B. A configuration of the user information storage area 40 in FIG. 9 is the same as the configuration of the user information storage area 40 shown in FIG. 3. In the present embodiment, however, as will be described later, user information and duplicated use information are stored in the user information storage area 40. The first management area 41A in FIG. 9 is an area for individually storing / managing first physical address information of the initial de...
second embodiment
[0191]In the present embodiment, a description is given of repair processing (refresh processing) for the first block (user information block) 42 that is determined to be the tentative late defective block in the first embodiment. FIG. 17 is a flowchart showing operation of the computer system 1 according to the present embodiment.
[0192]Suppose while the power ON status in the memory card 3, which has been described in the first embodiment, is continuing, the memory card 3 receives, from the computer 2, a predetermined command that enables the memory card 3 to secure an idling period in the relationship with the computer 2 (step S201). When the memory card 3 receives the predetermined command, the memory controller 5 (e.g., the computing device 50) carries out the repair processing to the tentative late defective block (step S202).
[0193]Specifically, the memory controller 5 (e.g., the computing device 50) repairs the user information block 42 determined to be the tentative late defe...
third embodiment
[0201]In the first embodiment, the case where the number of (physical and logical) mirror areas is one has been described. That is, only one duplicate of the user information is prepared. In contrast, in a third embodiment, a case where there are a plurality of (physical and logical) mirror areas is described. That is, a plurality of duplicates of the user information are prepared. In the present embodiment, for simplification of the description, a case where the number of the (physical and logical) mirror areas is two is described.
[0202]FIG. 18A is a diagram schematically illustrating a logical space. Moreover, FIG. 18B is a diagram schematically illustrating a physical space before a late defective block occurs (that is, only the initial defect blocks have occurred).
[0203]In FIG. 18B, the user information storage area 40 of the memory 4 is made up of the 16 first blocks 42. In the respective first blocks 42, the first physical addresses PBA0 to PBA15 are set in the ascending order...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


